Civil Tenders

Civil Tenders

VETERANS AFFAIRS, DEPARTMENT OF USA Tender

Machinery and Tools
United States
Details: Sources Sought Notice this Is A Sources Sought Notice (ssn) Only. The U.s. Government Is Conducting Market Research Only To Determine The Availability Of Qualified Sources Capable Of Providing Stryker Neptune Full-service Maintenance And Repair Services For Stryker Neptune 3 And Stryker Neptune Docker Devices. Potential Contractors Are Invited To Provide A Response Via E-mail To Contract Specialist At Tracy.heath@va.gov By January 03, 2025, 15:00 (pt). Responses Will Be Used To Determine The Appropriate Strategy For A Potential Acquisition. Please Clearly Identify Any Information Your Company Considers Sensitive Or Proprietary. This Notice Is Issued Solely For Information And Planning Purposes - It Does Not Constitute A Request For Quotation (rfq), Or A Promise To Issue An Rfq In The Future. This Notice Does Not Commit The U.s. Government To Contract For Any Supply Or Service. Further, The U.s. Government Is Not Seeking Quotes, Or Proposals At This Time And Will Not Accept Unsolicited Quotes In Response To This Sources Sought Synopsis. The U.s. Government Will Not Pay For Any Information Or Administrative Costs Incurred In Response To This Notice. Submittals Will Not Be Returned To The Responder. Not Responding To This Notice Does Not Preclude Participation In Any Future Rfq, If Any Is Issued. background: The Contractor Shall Provide All Preventative Maintenance And On-site Repairs. Contractor Shall Ensure That All Units Are Fully Operational According To Manufacturer Specifications Prior To Departure. Contractor Shall Provide All Necessary Travel, Labor, Materials, Tools, Documentation, And Parts Required For The Inspection, Support, And Repair Of The Equipment Listed In The Schedule Of Equipment Below. naics: 811210, Electronic And Precision Equipment Repair And Maintenance interested Potential Contractors Please Provide The Following. 1) Company Name, Address, Point Of Contact, Phone Number, Email Address, And Duns please Indicate Business Size: small Disadvantage Business (sdb)____ 8(a)____ historically Underutilized Business Zone (hubzone)____ service-disabled Veteran-owned Small Business (sdvosb)____ veteran-owned Small Business (vosb)_____ economically Disadvantaged Women-owned Small Business (edwosb)_____ women-owned Small Business Concerns (wosb)_____ small Business_____ large Business_____ please State If You Possess A Federal Supply Schedule (fss)______. 2) Please Submit A Brief Capability Statement (maximum Three Pages) With Enough Information To Demonstrate To The Veterans Affairs That You Have The Enough Resources, Personnel, And Experience To Perform Full Preventative Maintenance And On-site Repairs Per The Manufacturer Specifications As Required In The Attached Draft Statement Of Work. **draft Statement Of Work statement Of Work 1. Contract Title stryker Neptune Service Contract For The Va Puget Sound Health Care System Seattle Campus 2. Background the Puget Sound Health Care System, Seattle Campus Requires On-site, Full-service Maintenance And Repair Services To Ensure The Stryker Neptune 3 And Stryker Neptune 2 Docker Devices Are Operating Suitably For Clinical Use. 3. Scope this Contract Includes All Parts And Services To Properly Provide Preventative Maintenance And On-site Repairs. Contractor Shall Ensure That All Units Are Fully Operational According To Manufacturer Specifications Prior To Departure. Contractor Shall Provide All Necessary Travel, Labor, Materials, Tools, Documentation, And Parts Required For The Inspection, Support, And Repair Of The Equipment Listed In The Schedule Of Equipment (section 4). 4. Specific Tasks schedule Of Equipment: item # system Name qty serial # 1 stryker Neptune 3 11 2421904073 2 stryker Neptune 2 Docker 2 2417328353 3 stryker Neptune S 3 tbd 4 stryker Neptune Sem Docker 1 tbd the Contractor Shall Perform The Following Tasks: 1. Procare Protect Corrective Maintenance stryker Shall Provide The Services For Equipment Set Forth In The Applicable Service Plan, Subject To The Limitations And Exclusions Contained Herein: an Unlimited Number Of Repairs Or Replacements Of The Equipment, Due To Damage Associated With Normal Use, And Wear, Including All Parts And Labor Associated With Mail-in Services repair Or Replacement Of Equipment At Stryker S Sole Discretion if Applicable, Loaner Equipment During The Period That Equipment Is In Stryker S Possession For Repair, Except That All Such Loaner Equipment Is Subject To Availability And Stryker S Loaner Policy all Freight Costs Associated With Shipments Of Repairs And Loaner Equipment To The Vapshcs prioritized Repairs Over Non-contracted Customers, With No Additional Administration Or Approval Process training To Participant Personnel And Surgeons In The Safe And Effective Use Of The Equipment other Assistance Reasonably Requested By Participant In Connection With The Equipment on Each Scheduled On-site Service Call, Stryker Personnel Will Inspect And Adjust Each Available Item Of Equipment As Required In Accordance With Stryker S Then-current Maintenance Procedures For The Equipment any Maintenance Service Call Scheduled Outside Of Stryker S Normal Working Hours, (monday Through Friday, 7:00 Am To 5:00 Pm Local Time, Excluding Federal Holidays) May Carry An Additional Charge. 2. Procare Prevent Preventative Maintenance procare Prevent Coverage. Stryker Shall Provide The Procare Protect Coverage For The Equipment Set Forth In The Applicable Service Plan, In Addition To The Services Below, Subject To The Limitations And Exclusions Contained Herein: on-site Preventative Maintenance Inspections And Associated Documentation (i.e., The Joint Commission, Cms Or Dnv Equipment Checklists), For The Equipment stryker May Perform Preventative Maintenance And Repairs At The Vapshcs Or At The Applicable Stryker Repair Facility In Stryker S Sole Discretion all Travel Expenses Associated With Scheduled Preventative Maintenance Inspections each Scheduled On-site Service Call, Stryker Personnel Will Inspect And Adjust Each Available Item Of Equipment As Required In Accordance With Stryker S Then-current Maintenance Procedures For The Equipment (the Preventative Maintenance ). The Contractor Shall Provide The Station Point Of Contact Reports For All Work Performed, As Outlined In The Delivery Schedule preventative Maintenance Inspections Will Be Scheduled By Vapshcs Or Stryker At A Mutually Agreed Upon Time With The Facility. Equipment Not Made Available At The Mutually Agreed Upon Time Will Be Serviced During The Next Scheduled Service Call Or At Another Specified Date preventative Maintenance Shall Be Performed By The Contractor At Intervals In Accordance With The Manufacturer S Recommendations, But No Less Than Annually any Maintenance Service Call Scheduled Outside Of Stryker S Normal Working Hours, (monday Through Friday, 7:00 Am To 5:00 Pm Local Time, Excluding Federal Holidays) May Carry An Additional Charge general Requirements it Shall Be Understood That, Throughout Performance Of The Contract, The Contractor S Personnel, While On Va Property, Shall Adhere To All Requirements And Regulations That Govern The Va Health Care System And Its Property. among All Other Requirements, The Va Health Care System And Its Property Are Now Entirely Smoke Free. the Contractor And Their Personnel Shall Follow All U.s. Department Of Veterans Affairs (va) Policies, Standard Operating Procedures, Applicable Laws, And Applicable Regulations While On Va Property. Violations Of This May Result In Citation And Disciplinary Measures For Persons Violating The Law. contractor And Their Personnel Shall Always Wear Visible Identification While They Are On Premises. possession Of Weapons Is Prohibited. contractor Shall Take All Reasonable Precautions Necessary To Protect Persons And Property From Injury Or Damage During The Performance Of This Contract. invoicing Submissions in Addition To Regulations Set Forth In Far 52.212-4 (contract Terms And Conditions Commercial Items) (g) Invoice And Vaar 852.232-72 (electronic Submission Of Payment Requests), Contractor Shall Submit Final Invoice On Any Services Performed No Later Than 30 Days After End Of The Period Of Performance Of Contract. This Ensures That Closeout Of Contracts Follows Far 4.804-1(b). 6. Performance Monitoring the Contractor Shall Be Monitored By The Station Point Of Contact Or Their Designee. The Station Point Of Contact Shall Submit An Annual Performance Evaluation To Network Contracting Office 20 Summarizing The Performance Viewed Over The Period Of Performance. 8. Other Pertinent Information Or Special Considerations all Contractor Personnel Must Have At Least Two Years Of Field Experience As A Field Service Engineer Or Meet Oem Standards For A Fully Qualified Field Service Engineer To Perform Maintenance On The Equipment. No Subcontracting Is Authorized For This Contract. contractor Must Provide, Upon Request, Documentation Of Factory Certified Service/maintenance Training On The Specific Equipment Under The Terms Of This Contract. All Parts Used Shall Be Oem Parts Only. Reverse Engineered And/or Refurbished Parts Shall Not Be Utilized Under The Terms Of This Contract Without Explicit Permission, In Writing, From The Contracting Officer (co) After Co Consultation With Va Technical Representative (vatr). Subcontracting Of Any Ensuing Award Of This Solicitation Will Not Be Allowed Without Written Permission Of The Co. contractor Will Provide The Necessary Manpower And Supervision To Properly Execute The Preventative And Corrective Maintenance Of The Equipment Specified On Equipment List . the Station Point Of Contact Shall Conduct Routine Inspections, Product Sampling, And Monitoring Of Work While Contractor Is On Site. In The Event Of Any Concerns, The Station Point Of Contact Shall Notify Network Contracting Office 20 And Coordinate Addressing The Concerns. equipment May Be Added Or Deleted From The Service Contract As Needed Upon Modification By The Contracting Officer (co). Deleted Equipment Shall Be Credited In The Full Amount If Deleted Before Any Scheduled Maintenance Has Been Performed On It. 7. Risk Control vendor Must Coordinate With Station Point Of Contact For Access To The Seattle Campus. Once Vendor Completes The Service, They Must Check Out With Station Point Of Contact To Ensure That All Work Has Been Completed With No Issues. If Any Issues Arise The Station Point Of Contact Must Be Contacted. 8. Place Of Performance department Of Veterans Affairs puget Sound Health Care System seattle Division 1660 S. Columbian Way seattle, Wa 98108-1597 9. Period Of Performance. this Will Be A Single Award Firm Fixed Price Contract With One (1) Base Year And Up To Four (4) Option Years For This Contract: Base: 03/01/2025 02/28/2026 option Year 1: 03/01/2026 02/28/2027 option Year 2: 03/01/2027 02/29/2028 option Year 3: 03/01/2028 02/28/2029 option Year 4: 03/01/2029 02/28/2030 10. Delivery Schedule deliverable Title format calendar Days After Co Start full-service Report (fsr) For (3) Neptune S Rover 2pm Prevent Procare +sem contractor-determined Format; Comprehensive Service Report And Corrective And Preventative Maintenance Checklist within 24 Hours Of Service Completion, Email To Onsite Staff As Well As The Station Point Of Contact full-service Report (fsr) For (11) Neptune 3 Rover 2pm Prevent Procare +sem contractor-determined Format; Comprehensive Service Report And Corrective And Preventative Maintenance Checklist within 24 Hours Of Service Completion, Email To Onsite Staff As Well As The Station Point Of Contact full-service Report (fsr) For (3) Neptune 2 Docker 2pm Prevent Procare contractor-determined Format; Comprehensive Service Report And Corrective And Preventative Maintenance Checklist within 24 Hours Of Service Completion, Email To Onsite Staff As Well As The Station Point Of Contact monthly Report shows All The Work Accomplished Each Moth And All Work Planned To Be Accomplished In The Following Month. Identifies Unresolved Problems And Their Proposed Solution, As Well As Resolved Problems And The Steps Taken To Resolve Them. due The Last Day Of Each Month 11. Security Requirements the Contractor Employees Shall Not Have Access To Va Sensitive Or Computer Information And Will Not Require Routine Access To Va Facilities. The Contractor Employees Shall Require Intermittent Access Only And Will Be Escorted By Va Employees While At Va Facilities. No Background Investigation Is Required. access To Va Information And Info Systems the Contractor Or Subcontractor Must Notify The Contracting Officer Immediately When An Employee Working On A Va System Or With Access To Va Information Is Reassigned Or Leaves The Contractor Or Subcontractor S Employ. The Contracting Officer Must Also Be Notified Immediately By The Contractor Or Subcontractor Prior To An Unfriendly Termination. contract Personnel Who Require Access To National Security Programs Must Have A Valid Security Clearance. National Industrial Security Program (nisp) Was Established By Executive Order 12829 To Ensure That Cleared U.s. Defense Industry Contract Personnel Safeguard The Classified Information In Their Possession While Performing Work On Contracts, Programs, Bids, Or Research And Development Efforts. The Department Of Veterans Affairs Does Not Have A Memorandum Of Agreement With Defense Security Service (dss). Verification Of A Security Clearance Must Be Processed Through The Special Security Officer Located In The Planning And National Security Service Within The Office Of Operations, Security, And Preparedness. custom Software Development And Outsourced Operations Must Be In The U.s. To The Maximum Extent Practical. If Such Services Are Proposed To Be Performed Abroad And Are Not Disallowed By Other Va Policy Or Mandates, The Contractor/subcontractor Must State Where All Non-u.s. Services Are Provided And Detail A Security Plan, Deemed To Be Acceptable By Va, Specifically To Address Mitigation Of The Resulting Problems Of Communication, Control, Data Protection, And So Forth. Location Within The U.s. May Be An Evaluation Factor. va Information Custodial Language for Service That Involves The Storage, Generating, Transmitting, Or Exchanging Of Va Sensitive Information But Does Not Require C&a Or An Mou-isa For System Interconnection, The Contractor/subcontractor Must Complete A Contractor Security Control Assessment (csca) On A Yearly Basis And Provide It To The Cotr. the Contractor/subcontractor Must Store, Transport, Or Transmit Va Sensitive Information In An Encrypted Form, Using Va-approved Encryption Tools That Are, At A Minimum, Fips 140-2 Validated. the Contractor/subcontractor S Firewall And Web Services Security Controls, If Applicable, Shall Meet Or Exceed Va S Minimum Requirements. Va Configuration Guidelines Are Available Upon Request. except For Uses And Disclosures Of Va Information Authorized By This Contract For Performance Of The Contract, The Contractor/subcontractor May Use And Disclose Va Information Only In Two Other Situations: (i) In Response To A Qualifying Order Of A Court Of Competent Jurisdiction, Or (ii) With Va S Prior Written Approval. The Contractor/subcontractor Must Refer All Requests For, Demands For Production Of, Or Inquiries About, Va Information And Information Systems To The Va Contracting Officer For Response. notwithstanding The Provision Above, The Contractor/subcontractor Shall Not Release Va Records Protected By Title 38 U.s.c. 5705, Confidentiality Of Medical Quality Assurance Records And/or Title 38 U.s.c. 7332, Confidentiality Of Certain Health Records Pertaining To Drug Addiction, Sickle Cell Anemia, Alcoholism Or Alcohol Abuse, Or Infection With Human Immunodeficiency Virus. If The Contractor/subcontractor Is In Receipt Of A Court Order Or Other Requests For The Above-mentioned Information, That Contractor/subcontractor Shall Immediately Refer Such Court Orders Or Other Requests To The Va Contracting Officer For Response. security Incident Investigation the Term Security Incident Means An Event That Has, Or Could Have, Resulted In Unauthorized Access To, Loss Or Damage To Va Assets, Or Sensitive Information, Or An Action That Breaches Va Security Procedures. The Contractor/subcontractor Shall Immediately Notify The Cotr And Simultaneously, The Designated Iso And Privacy Officer For The Contract Of Any Known Or Suspected Security/privacy Incidents, Or Any Unauthorized Disclosure Of Sensitive Information, Including That Contained In System(s) To Which The Contractor/subcontractor Has Access. to The Extent Known By The Contractor/subcontractor, The Contractor/subcontractor S Notice To Va Shall Identify The Information Involved, The Circumstances Surrounding The Incident (including To Whom, How, When, And Where The Va Information Or Assets Were Placed At Risk Or Compromised), And Any Other Information That The Contractor/subcontractor Considers Relevant. with Respect To Unsecured Protected Health Information, The Business Associate Is Deemed To Have Discovered A Data Breach When The Business Associate Knew Or Should Have Known Of A Breach Of Such Information. Upon Discovery, The Business Associate Must Notify The Covered Entity Of The Breach. Notifications Need To Be Made In Accordance With The Executed Business Associate Agreement. in Instances Of Theft Or Break-in Or Other Criminal Activity, The Contractor/subcontractor Must Concurrently Report The Incident To The Appropriate Law Enforcement Entity (or Entities) Of Jurisdiction, Including The Va Oig And Security And Law Enforcement. The Contractor, Its Employees, And Its Subcontractors And Their Employees Shall Cooperate With Va And Any Law Enforcement Authority Responsible For The Investigation And Prosecution Of Any Possible Criminal Law Violation(s) Associated With Any Incident. The Contractor/subcontractor Shall Cooperate With Va In Any Civil Litigation To Recover Va Information, Obtain Monetary Or Other Compensation From A Third Party For Damages Arising From Any Incident, Or Obtain Injunctive Relief Against Any Third Party Arising From, Or Related To, The Incident. liquidated Damages For Data Breach consistent With The Requirements Of 38 U.s.c. §5725, A Contract May Require Access To Sensitive Personal Information. If So, The Contractor Is Liable To Va For Liquidated Damages In The Event Of A Data Breach Or Privacy Incident Involving Any Spi The Contractor/subcontractor Processes Or Maintains Under This Contract. the Contractor/subcontractor Shall Provide Notice To Va Of A Security Incident As Set Forth In The Security Incident Investigation Section Above. Upon Such Notification, Va Must Secure From A Non-department Entity Or The Va Office Of Inspector General An Independent Risk Analysis Of The Data Breach To Determine The Level Of Risk Associated With The Data Breach For The Potential Misuse Of Any Sensitive Personal Information Involved In The Data Breach. The Term 'data Breach' Means The Loss, Theft, Or Other Unauthorized Access, Or Any Access Other Than That Incidental To The Scope Of Employment, To Data Containing Sensitive Personal Information, In Electronic Or Printed Form, That Results In The Potential Compromise Of The Confidentiality Or Integrity Of The Data. Contractor Shall Fully Cooperate With The Entity Performing The Risk Analysis. Failure To Cooperate May Be Deemed A Material Breach And Grounds For Contract Termination. each Risk Analysis Shall Address All Relevant Information Concerning The Data Breach, Including The Following: (1) Nature Of The Event (loss, Theft, Unauthorized Access); (2) Description Of The Event, Including: (a) Date Of Occurrence; (b) Data Elements Involved, Including Any Pii, Such As Full Name, Social Security Number, Date Of Birth, Home Address, Account Number, Disability Code; (3) Number Of Individuals Affected Or Potentially Affected; (4) Names Of Individuals Or Groups Affected Or Potentially Affected; (5) Ease Of Logical Data Access To The Lost, Stolen Or Improperly Accessed Data In Light Of The Degree Of Protection For The Data, E.g., Unencrypted, Plain Text; (6) Amount Of Time The Data Has Been Out Of Va Control; (7) The Likelihood That The Sensitive Personal Information Will Or Has Been Compromised (made Accessible To And Usable By Unauthorized Persons); (8) Known Misuses Of Data Containing Sensitive Personal Information, If Any; (9) Assessment Of The Potential Harm To The Affected Individuals; (10) Data Breach Analysis As Outlined In 6500.2 Handbook, Management Of Security And Privacy Incidents, As Appropriate; And (11) Whether Credit Protection Services May Assist Record Subjects In Avoiding Or Mitigating The Results Of Identity Theft Based On The Sensitive Personal Information That May Have Been Compromised. based On The Determinations Of The Independent Risk Analysis, The Contractor Shall Be Responsible For Paying To The Va Liquidated Damages In The Amount Of $37.50 Per Affected Individual To Cover The Cost Of Providing Credit Protection Services To Affected Individuals Consisting Of The Following: (1) Notification; (2) One Year Of Credit Monitoring Services Consisting Of Automatic Daily Monitoring Of At Least 3 Relevant Credit Bureau Reports; (3) Data Breach Analysis; (4) Fraud Resolution Services, Including Writing Dispute Letters, Initiating Fraud Alerts And Credit Freezes, To Assist Affected Individuals To Bring Matters To Resolution; (5) One Year Of Identity Theft Insurance With $20,000.00 Coverage At $0 Deductible; And (6) Necessary Legal Expenses The Subjects May Incur To Repair Falsified Or Damaged Credit Records, Histories, Or Financial Affairs. security Controls on A Periodic Basis, Va, Including The Office Of Inspector General, Reserves The Right To Evaluate Any Or All Of The Security Controls And Privacy Practices Implemented By The Contractor Under The Clauses Contained Within The Contract. With 10 Working-days Notice, At The Request Of The Government, The Contractor Must Fully Cooperate And Assist In A Government-sponsored Security Controls Assessment At Each Location Wherein Va Information Is Processed Or Stored, Or Information Systems Are Developed, Operated, Maintained, Or Used On Behalf Of Va, Including Those Initiated By The Office Of Inspector General. The Government May Conduct A Security Control Assessment On Shorter Notice (to Include Unannounced Assessments) As Determined By Va In The Event Of A Security Incident Or At Any Other Time.⬠training all Contractor Employees And Subcontractor Employees Requiring Access To Va Information And Va Information Systems Shall Complete The Following Before Being Granted Access To Va Information And Its Systems: (1) Sign And Acknowledge (either Manually Or Electronically) Understanding Of And Responsibilities For Compliance With The Contractor Rules Of Behavior, Appendix E Relating To Access To Va Information And Information Systems; (2) Successfully Complete The Va Cyber Security Awareness And Rules Of Behavior Training And Annually Complete Required Security Training; (3) Successfully Complete The Appropriate Va Privacy Training And Annually Complete Required Privacy Training; And (4) Successfully Complete Any Additional Cyber Security Or Privacy Training, As Required For Va Personnel With Equivalent Information System Access [to Be Defined By The Va Program Official And Provided To The Contracting Officer For Inclusion In The Solicitation Document E.g., Any Role-based Information Security Training Required In Accordance With Nist Special Publication 800-16, Information Technology Security Training Requirements.] a. The Contractor Shall Provide To The Contracting Officer And/or The Cotr A Copy Of The Training Certificates And Certification Of Signing The Contractor Rules Of Behavior For Each Applicable Employee Within 1 Week Of The Initiation Of The Contract And Annually Thereafter, As Required. b. Failure To Complete The Mandatory Annual Training And Sign The Rules Of Behavior Annually, Within The Timeframe Required, Is Grounds For Suspension Or Termination Of All Physical Or Electronic Access Privileges And Removal From Work On The Contract Until Such Time As The Training And Documents Are Complete. 12. Government-furnished Equipment (gfe)/government-furnished Information (gfi) no Gfe Or Gfi Shall Be Provided To The Contractor For The Performance Of This Contract. information Made Available To The Contractor Or Subcontractor By Va For The Performance Or Administration Of This Contract Or Information Developed By The Contractor/subcontractor In Performance Or Administration Of The Contract Shall Be Used Only For Those Purposes And Shall Not Be Used In Any Other Way Without The Prior Written Agreement Of The Va. This Clause Expressly Limits The Contractor/subcontractor's Rights To Use Data As Described In Rights In Data - General, Far 52.227-14(d) (1). va Information Should Not Be Co-mingled, If Possible, With Any Other Data On The Contractors/subcontractor S Information Systems Or Media Storage Systems In Order To Ensure Va Requirements Related To Data Protection And Media Sanitization Can Be Met. If Co-mingling Must Be Allowed To Meet The Requirements Of The Business Need, The Contractor Must Ensure That Va S Information Is Returned To The Va Or Destroyed In Accordance With Va S Sanitization Requirements. Va Reserves The Right To Conduct On-site Inspections Of Contractor And Subcontractor It Resources To Ensure Data Security Controls, Separation Of Data And Job Duties, And Destruction/media Sanitization Procedures Are In Compliance With Va Directive Requirements. Prior To Termination Or Completion Of This Contract, Contractor/subcontractor Must Not Destroy Information Received From Va, Or Gathered/created By The Contractor In The Course Of Performing This Contract Without Prior Written Approval By The Va. any Data Destruction Done On Behalf Of Va By A Contractor/subcontractor Must Be Done In Accordance With National Archives And Records Administration (nara) Requirements As Outlined In Va Directive 6300, Records And Information Management And Its Handbook 6300.1 Records Management Procedures, Applicable Va Records Control Schedules, And Va Handbook 6500.1, Electronic Media Sanitization. Self-certification By The Contractor That The Data Destruction Requirements Above Have Been Met Must Be Sent To The Va Contracting Officer Within 30 Days Of Termination Of The Contract. the Contractor/subcontractor Must Receive, Gather, Store, Back Up, Maintain, Use, Disclose And Dispose Of Va Information Only In Compliance With The Terms Of The Contract And Applicable Federal And Va Information Confidentiality And Security Laws, Regulations, And Policies. If Federal Or Va Information Confidentiality And Security Laws, Regulations And Policies Become Applicable To The Va Information Or Information Systems After Execution Of The Contract, Or If Nist Issues Or Updates Applicable Fips Or Special Publications (sp) After Execution Of This Contract, The Parties Agree To Negotiate In Good Faith To Implement The Information Confidentiality And Security Laws, Regulations, And Policies In This Contract. the Contractor/subcontractor Shall Not Make Copies Of Va Information Except As Authorized And Necessary To Perform The Terms Of The Agreement Or To Preserve Electronic Information Stored On Contractor/subcontractor Electronic Storage Media For Restoration In Case Any Electronic Equipment Or Data Used By The Contractor/subcontractor Needs To Be Restored To An Operating State. If Copies Are Made For Restoration Purposes, After The Restoration Is Complete, The Copies Must Be Appropriately Destroyed. if Va Determines That The Contractor Has Violated Any Of The Information Confidentiality, Privacy, And Security Provisions Of The Contract, It Shall Be Sufficient Grounds For Va To Withhold Payment To The Contractor Or Third Party Or Terminate The Contract For Default Or Terminate For Cause Under Federal Acquisition Regulation (far) Part 12.
Closing Date3 Jan 2025
Tender AmountRefer Documents 

POLREGIO S A Tender

Electrical and Electronics...+1Electrical Works
Poland
Details: Polregio Sa, Opolski Zakład W Opole Invites Contractors with knowledge and experience in the subject of the Order to submit an Offer for the supply of bags and backpacks for conductor team employees in the following quantities: Bags - 30 pcs. Backpacks - 230 pcs. The Contractor – for the purposes of evaluating initial offers – is obliged to submit Samples, I.e. one copy of the bag and one copy of the backpack which are the subject of the Order. The Samples should be sent by the date of submission of offers, i.e. by 2nd January 2025, to the address Polregio Sa Opolski Zakład W Opole Ul. Krakowska 48, 45-075 Opole Room No. 13. 1. Delivery will take place in four Delivery Periods: 2. Delivery cost is borne by the Contractor. 3. Payment term - 30 days from the date of receipt by the Ordering Party of a correctly issued invoice. 4. Place of delivery - Polregio Sa Opolski Plant in Opole, Rolling Stock Maintenance Section Ul. K. Miarki 38, 47-220 Kędzierzyn-Koźle. 5. The Contractor shall attach, together with the delivered Goods, Approvals, Certificates, Quality Certificates and other documents required by applicable standards and regulations. The Contractor is obliged to submit a declaration of lack of grounds for exclusion - a template of the declaration is located in the Attachments tab. Partial offers are permitted. At the same time, I inform you that illustrative photos have been attached. Bags and backpacks do not have to look exactly as in the photos. A logo is not required. This Inquiry does not constitute an offer within the meaning of the Civil Code. The Ordering Party reserves the right to cancel the procedure at any stage (without selecting the offers) without giving a reason. The procedure is multi-stage and includes submitting an offer and conducting negotiations. The contractor whose offer is considered the most advantageous will be required to sign a declaration attached to the inquiry before signing the agreement. In the "attachments" tab you will find: - Declarations on the lack of grounds for exclusion; - Draft agreement (prepared for the needs of the Rfi); - GDPR information clause - Sample photos of backpacks and bags
Closing Date2 Jan 2025
Tender AmountNA 

VETERANS AFFAIRS, DEPARTMENT OF USA Tender

Others
United States
Details: Sources Sought Notice sources Sought: This Is Not A Solicitation For A Proposal, Proposal Abstract, Or Quote. The Purpose Of This Notice Is To Obtain Information Regarding Qualified Business Sources. The Responses To The Information Requested Will Assist The Government In Determining The Appropriate Acquisition Method. statement Of Work (sow) the Contractor Shall Render Genetic Testing Laboratory Services In Accordance With This Statement Of Work To Support The Health Science Research Department At Durham Va Medical Center Under The Direction Of Dr. Deepak Voora, Executive Director Of National Pharmacogenomics Program At Va Central Office, For The Study/iir Titled, Reducing Veterans' Risk Of Atherosclerotic Cardiovascular Disease Through Pharmacogenomics Informed Statin Prescribing Funded By The Va Durham Healthcare System And Delivered To The Indianapolis Va Health Care System. description: Genomic Medicine Research Has Many Complexities Requiring Specialized Services, Skills, And Expertise, Including Complex Laboratory Analyses Requiring Specialized Equipment And Expertise In The Generation And Interpretation Of Genomic Data; Large Complex Genomic Datasets With Particular Storage, Privacy, And Information Security Requirements; Clinical Expertise In How Genomic Medicine Interventions Might Inform Health Care And Impact Health Outcomes; And Sensitivity To The Ethical, Psychosocial, Legal, And Regulatory Considerations Of Genomic Medicine Research. background: This Research Grant Proposes A Single Center, Randomized Clinical Trial Of Precision Statin Prescribing Versus Usual Care To Be Conducted At The Indianapolis Va Health Care System. Four-hundred And Ten (410) Veteran Patients Who Are At Risk For Cardiovascular Events And Have A Class I Indication For Statin Therapy, But Are Not Currently Prescribed One, Will Be Recruited And Randomly Allocated To Receive Either 1) Genetic Test Report That Provides An Assessment Of Their Risk For Cardiovascular Disease Events Based On A Polygenic Risk Score (prs) For Coronary Artery Disease And Their Risk Of Statin Associated Musculoskeletal Symptoms Based On Slco1b1 Genetic Testing Or 2) Usual Care. Specimens For Genetic Testing Will Be Collected Via Saliva Kit Administered With The Assistance Of Research Staff And Shipped Using A Common Carrier Delivery Service And Standard Chain Of Custody. description Of Work: The Contractor S Laboratory Services Shall Be In Accordance With Clinical Laboratory Improvement Amendments (clia) And Be A College Of American Pathologists (cap) Certified Clinical Diagnostic Genetic Testing Laboratory In Order To Successfully Perform The Required Genetic Testing For This Study. the Performing Laboratory Will Perform Dna Testing For A Prs For Cad And Slco1b1 Based Dna Sequencing, Pcr, Or Array-based Technologies, Analysis, Interpretation, And Reporting For This Study. the Certification And Accreditation (c&a) Requirements Do Not Apply, And That A Security Accreditation Package Is Not Required. primary Contractor Duties Include, But Are Not Limited To: specimen Accessioning, Extraction, And Test Management dna Sequencing And/or Genotyping For polygenic Risk Score (prs) For Coronary Artery Disease Cad genome Wide Genotyping/sequencing whole Genome Imputation variant Calling sample Qc genetic Variant Qc ancestry Specific Prs Calculation For Cad prs Interpretation And Report In Pdf Format slco1b1 Genetic Testing genotyping/sequencing variant Calling sample/variant Qc Star Allele Diplotype And Phenotype Interpretation Based On The Clinical Pharmacogenetics Implementation Consortium (cpic) Guidelines. reporting In Pdf Format each Laboratory Tests Unit Shall Include: saliva Swab Dna Collection Kit genome-wide Genotyping With Illumina Iscan Microarray Technology whole Genome Imputation variant Calling sample Qc (call Rate, Nominal Coverage, Heterozygosity Rate) genetic Variant Qc (genotype Probability) ancestry Specific Prs Calculation For Cad Prs cad Prs Reporting In Pdf Format slco1b1 Testing And Reporting In Pdf Format deliverables: Specific Items To Be Delivered To The Va Investigators, Include, But Are Not Limited To: human Specimen Sample Collection Supplies And Shipping Materials, Compliant With All Current Federal Regulations. clinical Polygenic Risk Score And Slco1b1 Report For Participants Randomized To The Genetic Testing Arm Of The Study. a Required Total Of An Estimated 68 Tests Per Year For Three (3) Years. other Pertinent Information: the Contractor Shall Provide Services For Both Components Of Necessary Testing: 1. Polygenic Risk Score For Coronary Artery Disease And 2. Slco1b1 Genetic Testing. the Contractor Shall Provide An Existing Ldt That They Have Available For The Purposes In This Statement Of Work, As Va Does Not Have An Ldt For These Purposes. The Vendor Shall Have An Existing Ldt As The Va Will Use The Ldt Within One Month Of The Contract Being Awarded. the Contractor Shall Not Work In Conjunction With Another Laboratory For The Polygenic Risk Score Or The Genetic Testing For Slco1b1 As Subcontracting Out And Shipping Samples From One Contractor S Laboratory To Another Is Not Within Best Interest Of The Va S Need At This Time. the Contractor S Services Shall Be Available Readily To Render To Va, In House, At Time Of Contract Award. timeframe: The Estimated Beginning And Ending Dates During Which The Contractor Is Required To Perform Work For Va Durham Are 1/13/2025 To 1/12/2026 With The Option To Renew Yearly Through 1/13/2028. va Information And Information System Security And Privacy Language 1. General. This Entire Section Applies To All Acquisitions Requiring Any Information Security And Privacy Language. Contractors, Contractor Personnel, Subcontractors And Subcontractor Personnel Will Be Subject To The Same Federal Laws, Regulations, Standards, Va Directives And Handbooks, As Va Personnel Regarding Information And Information System Security And Privacy. 2. Va Information Custodial Language. This Entire Section Applies To All Acquisitions Requiring Any Information Security And Privacy Language. a. The Government Shall Receive Unlimited Rights To Data/intellectual Property First Produced And Delivered In The Performance Of This Contract Or Order (hereinafter Contract ) Unless Expressly Stated Otherwise In This Contract. This Includes All Rights To Source Code And All Documentation Created In Support Thereof. The Primary Clause Used To Define Government And Contractor Data Rights Is Far 52.227-14 Rights In Data General. The Primary Clause Used To Define Computer Software License (not Data/intellectual Property First Produced Under This Contractor Or Order) Is Far 52.227-19, Commercial Computer Software License. b. Information Made Available To The Contractor By Va For The Performance Or Administration Of This Contract Will Be Used Only For The Purposes Specified In The Service Agreement, Sow, Pws, Pd, And/or Contract. The Contractor Shall Not Use Va Information In Any Other Manner Without Prior Written Approval From A Va Contracting Officer (co). The Primary Clause Used To Define Government And Contractor Data Rights Is Far 52.227-14 Rights In Data General. c. Va Information Will Not Be Co-mingled With Any Other Data On The Contractor S Information Systems Or Media Storage Systems. The Contractor Shall Ensure Compliance With Federal And Va Requirements Related To Data Protection, Data Encryption, Physical Data Segregation, Logical Data Segregation, Classification Requirements And Media Sanitization. d. Va Reserves The Right To Conduct Scheduled Or Unscheduled Audits, Assessments, Or Investigations Of Contractor Information Technology (it) Resources To Ensure Information Security Is Compliant With Federal And Va Requirements. The Contractor Shall Provide All Necessary Access To Records (including Electronic And Documentary Materials Related To The Contracts And Subcontracts) And Support (including Access To Contractor And Subcontractor Staff Associated With The Contract) To Va, Va's Office Inspector General (oig), And/or Government Accountability Office (gao) Staff During Periodic Control Assessments, Audits, Or Investigations. e. The Contractor May Only Use Va Information Within The Terms Of The Contract And Applicable Federal Law, Regulations, And Va Policies. If New Federal Information Security Laws, Regulations Or Va Policies Become Applicable After Execution Of The Contract, The Parties Agree To Negotiate Contract Modification And Adjustment Necessary To Implement The New Laws, Regulations, And/or Policies. f. The Contractor Shall Not Make Copies Of Va Information Except As Specifically Authorized And Necessary To Perform The Terms Of The Contract. If Copies Are Made For Restoration Purposes, After The Restoration Is Complete, The Copies Shall Be Destroyed In Accordance With Va Directive 6500, Va Cybersecurity Program And Va Information Security Knowledge Service. g. If A Veterans Health Administration (vha) Contract Is Terminated For Default Or Cause With A Business Associate, The Related Local Business Associate Agreement (baa) Shall Also Be Terminated And Actions Taken In Accordance With Vha Directive 1605.05, Business Associate Agreements. If There Is An Executed National Baa Associated With The Contract, Va Will Determine What Actions Are Appropriate And Notify The Contactor. h. The Contractor Shall Store And Transmit Va Sensitive Information In An Encrypted Form, Using Va-approved Encryption Tools Which Are, At A Minimum, Federal Information Processing Standards (fips) 140-2, Security Requirements For Cryptographic Modules (or Its Successor) Validated And In Conformance With Va Information Security Knowledge Service Requirements. The Contractor Shall Transmit Va Sensitive Information Using Va Approved Transport Layer Security (tls) Configured With Fips Based Cipher Suites In Conformance With National Institute Of Standards And Technology (nist) 800-52, Guidelines For The Selection, Configuration And Use Of Transport Layer Security (tls) Implementations. the Contractor S Firewall And Web Services Security Controls, As Applicable, Shall Meet Or Exceed Va S Minimum Requirements. j. Except For Uses And Disclosures Of Va Information Authorized By This Contract For Performance Of The Contract, The Contractor May Use And Disclose Va Information Only In Two Situations: (i) In Response To A Qualifying Order Of A Court Of Competent Jurisdiction After Notification To Va Co (ii) With Written Approval From The Va Co. The Contractor Shall Refer All Requests For, Demands For Production Of Or Inquiries About, Va Information And Information Systems To The Va Co For Response. k. Notwithstanding The Provision Above, The Contractor Shall Not Release Va Records Protected By Title 38 U.s.c. § 5705, Confidentiality Of Medical Qualityassurance Records And/or Title 38 U.s.c. § 7332, Confidentiality Of Certain Medical Records Pertaining To Drug Addiction, Sickle Cell Anemia, Alcoholism Or Alcohol Abuse Or Infection With Human Immunodeficiency Virus (hiv). If The Contractor Is In Receipt Of A Court Order Or Other Requests For The Above Mentioned Information, The Contractor Shall Immediately Refer Such Court Order Or Other Requests To The Va Co For Response. l. Information Made Available To The Contractor By Va For The Performance Or Administration Of This Contract Or Information Developed By The Contractor In Performance Or Administration Of The Contract Will Be Protected And Secured In Accordance With Va Directive 6500 And Identity And Access Management (iam) Security Processes Specified In The Va Information Security Knowledge Service. m. Any Data Destruction Done On Behalf Of Va By A Contractor Shall Be Done In Accordance With National Archives And Records Administration (nara) Requirements As Outlined In Va Directive 6300, Records And Information Management, Va Handbook 6300.1, Records Management Procedures, And Applicable Va Records Control Schedules. n. The Contractor Shall Provide Its Plan For Destruction Of All Va Data In Its Possession According To Va Directive 6500 And Nist 800-88, Guidelines For Media Sanitization Prior To Termination Or Completion Of This Contract. If Directed By The Cor/co, The Contractor Shall Return All Federal Records To Va For Disposition. o. Any Media, Such As Paper, Magnetic Tape, Magnetic Disks, Solid State Devices Or Optical Discs That Is Used To Store, Process, Or Access Va Information That Cannot Be Destroyed Shall Be Returned To Va.the Contractor Shall Hold The Appropriate Material Until Otherwise Directed By The Contracting Officer S Representative (cor) Or Co. Items Shall Be Returned Securely Via Va-approved Methods. Va Sensitive Information Must Be Transmitted Utilizing Va-approved Encryption Tools Which Are Validated Under Fips 140-2 (or Its Successor) And Nist 800-52. If Mailed, The Contractor Shall Send Via A Trackable Method (usps, Ups, Fedex, Etc.) And Immediately Provide The Cor/co With The Tracking Information. Self-certification By The Contractor That The Data Destruction Requirements Above Have Been Met Shall Be Sent To The Cor/co Within 30 Business Days Of Termination Of The Contract. p. All Electronic Storage Media (hard Drives, Optical Disks, Cds, Back-up Tapes, Etc.) Used To Store, Process Or Access Va Information Will Not Be Returned To The Contractor At The End Of Lease, Loan, Or Trade-in. Exceptions To This Paragraph Will Only Be Granted With The Written Approval Of The Va Co. 3. Access To Va Information And Va Information Systems. This Section Applies When Any Person Requires Access To Information Made Available To The Contractor By Va For The Performance Or Administration Of This Contract Or Information Developed By The Contractor In Performance Or Administration Of The Contract. a. A Contractor/subcontractor Shall Request Logical (technical) Or Physical Access To Va Information And Va Information Systems For Their Employees And Subcontractors Only To The Extent Necessary To Perform The Services Specified In The Solicitation Or Contract. This Includes Indirect Entities, Both Affiliate Of Contractor/subcontractor And Agent Of Contractor/subcontractor. b. Contractors And Subcontractors Shall Sign The Va Information Security Rule Of Behavior (rob) Before Access Is Provided To Va Information And Information Systems (see Section 4, Training, Below). The Rob Contains The Minimum User Compliance Requirements And Does Not Supersede Any Policies Of Va Facilities Or Other Agency Components Which Provide Higher Levels Of Protection To Va S Information Or Information Systems. Users Who Require Privileged Access Shall Complete The Va Elevated Privilege Access Request Processes Before Privileged Access Is Granted. c. All Contractors And Subcontractors Working With Va Information Are Subject To The Same Security Investigative And Clearance Requirements As Those Of Va Appointees Or Employees Who Have Access To The Same Types Of Information. The Level And Process Of Background Security Investigations For Contractors Shall Be In Accordance With Va Directive And Handbook 0710, Personnel Suitability And Security Program. The Office Of Human Resources And Administration/operations, Security And Preparedness (hra/osp) Is Responsible For These Policies And Procedures. Contract Personnel Who Require Access To Classified Information Or Information Systems Shall Have An Appropriate Security Clearance. Verification Of A Security Clearance Shall Be Processed Through The Special Security Officer Located In Hra/osp. Contractors Shall Conform To All Requirements Stated In The National Industrial Security Program Operating Manual (nispom). d. All Contractors And Subcontractors Shall Comply With Conditions Specified In Vaar 852.204-71(d); Contractor Operations Required To Be In United States. All Contractors And Subcontractors Working With Va Information Must Be Permanently Located Within A Jurisdiction Subject To The Law Of The United States Or Its Territories To The Maximum Extent Feasible. If Services Are Proposed To Be Performed Abroad The Contractor Must State Where All Non-u.s. Services Are Provided. The Contractor Shall Deliver To Va A Detailed Plan Specifically Addressing Communications, Personnel Control, Data Protection And Potential Legal Issues. The Plan Shall Be Approved By The Cor/co In Writing Prior To Access Being Granted. e. The Contractor Shall Notify The Cor/co In Writing Immediately (no Later Than 24 Hours) After Personnel Separation Or Occurrence Of Other Causes. Causes May Include The Following: (1) Contractor/subcontractor Personnel No Longer Has A Need For Access To Va Information Or Va Information Systems. (2) Contractor/subcontractor Personnel Are Terminated, Suspended, Or Otherwise Has Their Work On A Va Project Discontinued For Any Reason. (3) Contractor Believes Their Own Personnel Or Subcontractor Personnel May Pose A Threat To Their Company S Working Environment Or To Any Companyowned Property. This Includes Contractor-owned Assets, Buildings, Confidential Data, Customers, Employees, Networks, Systems, Trade Secrets And/or Va Data. (4) Any Previously Undisclosed Changes To Contractor/subcontractor Background History Are Brought To Light, Including But Not Limited To Changes To Background Investigation Or Employee Record. (5) Contractor/subcontractor Personnel Have Their Authorization To Work In The United States Revoked. (6) Agreement By Which Contractor Provides Products And Services To Va Has Either Been Fulfilled Or Terminated, Such That Va Can Cut Off Electronic And/or Physical Access For Contractor Personnel. f. In Such Cases Of Contract Fulfillment, Termination, Or Other Causes; The Contractor Shall Take The Necessary Measures To Immediately Revoke Access To Va Network, Property, Information, And Information Systems (logical And Physical) By Contractor/subcontractor Personnel. These Measures Include (but Are Not Limited To): Removing And Then Securing Personal Identity Verification (piv) Badges And Piv Interoperable (piv-i) Access Badges, Va-issued Photo Badges, Credentials For Va Facilities And Devices, Va-issued Laptops, And Authentication Tokens. Contractors Shall Notify The Appropriate Va Cor/co Immediately To Initiate Access Removal. g. Contractors/subcontractors Who No Longer Require Va Accesses Will Return Vaissued Property To Va. This Property Includes (but Is Not Limited To): Documents, Electronic Equipment, Keys, And Parking Passes. Piv And Piv-i Access Badges Shall Be Returned To The Nearest Va Piv Badge Issuance Office. Once They Have Had Access To Va Information, Information Systems, Networks And Va Property In Their Possessions Removed, Contractors Shall Notify The Appropriate Va Cor/co. 4. Training. This Entire Section Applies To All Acquisitions Which Include Section 3. a. All Contractors And Subcontractors Requiring Access To Va Information And Va Information Systems Shall Successfully Complete The Following Before Being Granted Access To Va Information And Its Systems: (1) Va Privacy And Information Security Awareness And Rules Of Behavior Course (talent Management System (tms) #10176) Initially And Annually Thereafter. (2) Sign And Acknowledge (electronically Through Tms #10176) Understanding Of And Responsibilities For Compliance With The Organizational Rules Of Behavior, Relating To Access To Va Information And Information Systems Initially And Annually Thereafter; And (3) Successfully Complete Any Additional Cyber Security Or Privacy Training, As required For Va Personnel With Equivalent Information System Or Information Access [to Be Defined By The Va Program Official And Provided To The Va Co For Inclusion In The Solicitation Document I.e., Any Rolebased Information Security Training]. b. The Contractor Shall Provide To The Cor/co A Copy Of The Training Certificates And Certification Of Signing The Organizational Rules Of Behavior For Each Applicable Employee Within Five Days Of The Initiation Of The Contract And Annually Thereafter, As Required. c. Failure To Complete The Mandatory Annual Training Is Grounds For Suspension Or Termination Of All Physical Or Electronic Access Privileges And Removal From Work On The Contract Until Such Time As The Required Training Is Complete. 5. Security Incident Investigation. This Entire Section Applies To All Acquisitions Requiring Any Information Security And Privacy Language. a. The Contractor, Subcontractor, Their Employees, Or Business Associates Shall Immediately (within One Hour) Report Suspected Security / Privacy Incidents To The Va Oit S Enterprise Service Desk (esd) By Calling (855) 673-4357 (tty: 711). The Esd Is Oit S 24/7/365 Single Point Of Contact For It-related Issues. After Reporting To The Esd, The Contractor, Subcontractor, Their Employees, Or Business Associates Shall, Within One Hour, Provide The Cor/co The Incident Number Received From The Esd. b. To The Extent Known By The Contractor/subcontractor, The Contractor/ Subcontractor's Notice To Va Shall Identify The Information Involved And The Circumstances Surrounding The Incident, Including The Following: (1) The Date And Time (or Approximation Of) The Security Incident Occurred. (2) The Names Of Individuals Involved (when Applicable). (3) The Physical And Logical (if Applicable) Location Of The Incident. (4) Why The Security Incident Took Place (i.e., Catalyst For The Failure). (5) The Amount Of Data Belonging To Va Believed To Have Been Compromised. (6) The Remediation Measures The Contractor Is Taking To Ensure No Future Incidents Of A Similar Nature. c. After The Contractor Has Provided The Initial Detailed Incident Summary To Va, They Will Continue To Provide Written Updates On Any New And Relevant Circumstances Or Facts They Discover. The Contractor, Subcontractor, And Their Employes Shall Fully Cooperate With Va Or Third-party Entity Performing An Independent Risk Analysis On Behalf Of Va. Failure To Cooperate May Be Deemed A Material Breach And Grounds For Contract Termination. d. Va It Contractors Shall Follow Va Handbook 6500, Risk Management Framework For Va Information Systems Va Information Security Program, And Va Information Security Knowledge Service Guidance For Implementing An Incident Response Plan Or Integrating With An Existing Va Implementation. e. In Instances Of Theft Or Break-in Or Other Criminal Activity, The Contractor/subcontractor Must Concurrently Report The Incident To The Appropriate Law Enforcement Entity (or Entities) Of Jurisdiction, Including The Va Oig, And The Va Office Of Security And Law Enforcement. The Contractor, Its Employees, And Its Subcontractors And Their Employees Shall Cooperate With Va And Any Law Enforcement Authority Responsible For The Investigation And Prosecution Of Any Possible Criminal Law Violation(s) Associated With Any Incident. The Contractor/subcontractor Shall Cooperate With Va In Any Civil Litigation To Recover Va Information, Obtain Monetary Or Other Compensation From A Third Party For Damages Arising From Any Incident, Or Obtain Injunctive Relief Against Any Third Party Arising From, Or Related To, The Incident. f. The Contractor Shall Comply With Va Handbook 6500.2, Management Of Breaches Involving Sensitive Personal Information, Which Establishes The Breach Management Policies And Assigns Responsibilities For The Oversight, Management And Reporting Procedures Associated With Managing Of Breaches. g. With Respect To Unsecured Protected Health Information (phi), The Contractor Is Deemed To Have Discovered A Data Breach When The Contractor Knew Or Should Have Known Of Breach Of Such Information. When A Business Associate Is Part Of Vha Contract, Notification To The Covered Entity (vha) Shall Be Made In Accordance With The Executed Baa. h. If The Contractor Or Any Of Its Agents Fails To Protect Va Sensitive Personal Information Or Otherwise Engages In Conduct Which Results In A Data Breach Involving Any Va Sensitive Personal Information The Contractor/subcontractor Processes Or Maintains Under The Contract; The Contractor Shall Pay Liquidated Damages To The Va As Set Forth In Clause 852.211-76, Liquidated Damages Reimbursement For Data Breach Costs 6. Information System Design And Development. This Entire Section Applies To Information Systems, Systems, Major Applications, Minor Applications, Enclaves, And Platform Information Technologies (to Include The Subcomponents Of Each) Designed Or Developed For Or On Behalf Of Va By Any Non-va Entity. a. Information Systems Designed Or Developed On Behalf Of Va At Non-va Facilities Shall Comply With All Applicable Federal Law, Regulations, And Va Policies. This Includes Standards For The Protection Of Electronic Protected Health Information (phi), Outlined In 45 C.f.r. Part 164, Subpart C And Information And System Security Categorization Level Designations In Accordance With Fips 199, Standards For Security Categorization Of Federal Information And Information Systems And Fips 200, Minimum Security Requirements For Federal Information Systems. Baseline Security Controls Shall Be Implemented Commensurate With The Fips 199 System Security Categorization (reference Va Handbook 6500 And Va Trusted Internet Connections (tic) Architecture). b. Contracted New Developments Require Creation, Testing, Evaluation, And Authorization In Compliance With Va Assessment And Authorization (a&a) Processes In Va Handbook 6500 And Va Information Security Knowledge Service To Obtain An Authority To Operate (ato). Va Directive 6517, Risk Management Framework For Cloud Computing Services, Provides The Security And Privacy Requirements For Cloud Environments. c. Va It Contractors, Subcontractors And Third-party Service Providers Shall Address And/or Integrate Applicable Va Handbook 6500, Va Handbook 6517, Risk Management Framework For Cloud Computing Services And Information Security Knowledge Service Specifications In Delivered It Systems/solutions, Products And/or Services. If Systems/solutions, Products And/or Services Do Not Directly Match Va Security Requirements, The Contractor Shall Work Though The Cor/co To Identify The Va Organization Responsible For Governance Or Resolution. Contractors Shall Comply With Far 39.1, Specifically The Prohibitions Referenced. d. The Contractor (including Producers And Resellers) Shall Comply With Office Of Management And Budget (omb) M-22-18 And M-23-16 When Using Third-party Software On Va Information Systems Or Otherwise Affecting The Va Information. This Includes New Software Purchases And Software Renewals For Software Developed Or Modified By Major Version Change After The Issuance Date Of M22-18 (september 14, 2022). The Term Software Includes Firmware, Operating Systems, Applications And Application Services (e.g., Cloud-based Software), As Well As Products Containing Software. The Contractor Shall Provide A Self Attestation That Secure Software Development Practices Are Utilized As Outlined By Executive Order (eo)14028 And Nist Guidance. A Third-party Assessment Provided By Either A Certified Federal Risk And Authorization Management Program (fedramp) Third Party Assessor Organization (3pao) Or One Approved By The Agency Will Be Acceptable In Lieu Of A Software Producer's Self Attestation. e. The Contractor Shall Ensure All Delivered Applications, Systems And Information Systems Are Compliant With Homeland Security Presidential Directive (hspd) 12 And Va Identity And Access Management (iam) Enterprise Identity Management Requirements As Set Forth In Omb M-19-17, M-05-24, Fips 201-3, Personal Identity Verification (piv) Of Federal Employees And Contractors (or Its Successor), M-21-31 And Supporting Nist Guidance. This Applies To Commercial Off-the-shelf (cots) Product(s) That The Contractor Did Not Develop, All Software Configurations And All Customizations. f. The Contractor Shall Ensure All Contractor Delivered Applications And Systems Provide User Authentication Services Compliant With Va Handbook 6500, Va Information Security Knowledge Service, Iam Enterprise Requirements And Nist 800-63, Digital Identity Guidelines, For Direct, Assertion-based Authentication And/or Trust-based Authentication, As Determined By The Design And Integration Patterns. Direct Authentication At A Minimum Must Include Public Key Infrastructure (pki) Based Authentication Supportive Of Piv And/or Common Access Card (cac), As Determined By The Business Need And Compliance With Va Information Security Knowledge Service Specifications. g. The Contractor Shall Use Va Authorized Technical Security Baseline Configurations And Certify To The Cor That Applications Are Fully Functional And Operate Correctly As Intended On Systems In Compliance With Va Baselines Prior To Acceptance Or Connection Into An Authorized Va Computing Environment. If The Defense Information Systems Agency (disa) Has Created A Security Technical Implementation Guide (stig) For The Technology, The Contractor May Configure To Comply With That Stig. If Va Determines A New Or Updated Va Configuration Baseline Needs To Be Created, The Contractor Shall Provide Required Technical Support To Develop The Configuration Settings. Far 39.1 Requires The Population Of Operating Systems And Applications Includes All Listed On The Nist National Checklist Program Checklist Repository. h. The Standard Installation, Operation, Maintenance, Updating And Patching Of Software Shall Not Alter The Configuration Settings From Va Approved Baseline Configuration. Software Developed For Va Must Be Compatible With Va Enterprise Installer Services And Install To The Default Program Files Directory With Silently Install And Uninstall. The Contractor Shall Perform Testing Of All Updates And Patching Prior To Implementation On Va Systems. i. Applications Designed For Normal End Users Will Run In The Standard User Context Without Elevated System Administration Privileges. j. The Contractor-delivered Solutions Shall Reside On Va Approved Operating Systems. Exceptions To This Will Only Be Granted With The Written Approval Of The Cor/co. k. The Contractor Shall Design, Develop, And Implement Security And Privacy Controls In Accordance With The Provisions Of Va Security System Development Life Cycle Outlined In Nist 800-37, Risk Management Framework For Information Systems And Organizations: A System Life Cycle Approach For Security And Privacy, Va Directive And Handbook 6500, And Va Handbook 6517. l. The Contractor Shall Comply With The Privacy Act Of1974 (the Act), Far 52.224-2 Privacy Act, And Va Rules And Regulations Issued Under The Act In The Design, Development, Or Operation Of Any System Of Records On Individuals To Accomplish A Va Function. m. The Contractor Shall Ensure The Security Of All Procured Or Developed Information Systems, Systems, Major Applications, Minor Applications, Enclaves And Platform Information Technologies, Including Their Subcomponents (hereinafter Referred To As Information Systems ) Throughout The Life Of This Contract And Any Extension, Warranty, Or Maintenance Periods. This Includes Security Configurations, Workarounds, Patches, Hotfixes, Upgrades, Replacements And Any Physical Components Which May Be Necessary To Remediate All Security Vulnerabilities Published Or Known To The Contractor Anywhere In The Information Systems (including Systems, Operating Systems, Products, Hardware, Software, Applications And Firmware). The Contractor Shall Ensure Security Fixes Do Not Negatively Impact The Information Systems. n. When The Contractor Is Responsible For Operations Or Maintenance Of The Systems, The Contractor Shall Apply The Security Fixes Within The Timeframe Specified By The Associated Controls On The Va Information Security Knowledge Service. When Security Fixes Involve Installing Third Party Patches (such As Microsoft Os Patches Or Adobe Acrobat), The Contractor Shall Provide Written Notice To The Va Cor/co That The Patch Has Been Validated As To Not Affecting The Systems Within 10 Business Days. 7. Information System Hosting, Operation, Maintenance Or Use. this Entire Section Applies To Information Systems, Systems, Major Applications, Minor Applications, Enclaves, And Platform Information Technologies (cloud And Noncloud) Hosted, Operated, Maintained, Or Used On Behalf Of Va At Non-va Facilities. a. The Contractor Shall Comply With All Federal Laws, Regulations, And Va Policies For Information Systems (cloud And Non-cloud) That Are Hosted, Operated, Maintained, Or Used On Behalf Of Va At Non-va Facilities. Security Controls For Collecting, Processing, Transmitting, And Storing Of Va Sensitive Information, Must Be In Place. The Controls Will Be Tested By Va Or A Va Sanctioned 3paoand Approved By Va Prior To Hosting, Operation, Maintenance Or Use Of The Information System Or Systems By Or On Behalf Of Va. This Includes Conducting Compliance Risk Assessments, Security Architecture Analysis, Routine Vulnerability Scanning, System Patching, Change Management Procedures And The Completion Of An Acceptable Contingency Plan For Each System. The Contractor S Security Control Procedures Shall Be The Same As Procedures Used To Secure Va-operated Information Systems. b. Outsourcing (contractor Facility, Equipment, Or Staff) Of Systems Or Network Operations, Telecommunications Services Or Other Managed Services Require Assessment And Authorization (a&a) Of The Contractor S Systems In Accordance With Va Handbook 6500 As Specified In Va Information Security Knowledge Service. Major Changes To The A&a Package May Require Reviewing And Updating All The Documentation Associated With The Change. The Contractor S Cloud Computing Systems Shall Comply With Fedramp And Va Directive 6517 Requirements. c. The Contractor Shall Return All Electronic Storage Media (hard Drives, Optical Disks, Cds, Back-up Tapes, Etc.) On Non-va Leased Or Non-va Owned It Equipment Used To Store, Process Or Access Va Information To Va In Accordance With A&a Package Requirements. This Applies When The Contract Is Terminated Or Completed And Prior To Disposal Of Media. The Contractor Shall Provide Its Plan For Destruction Of All Va Data In Its Possession According To Va Information Security Knowledge Service Requirements And Nist 800-88. The Contractor Shall Send A Self-certification That The Data Destruction Requirements Above Have Been Met To The Cor/co Within 30 Business Days Of Termination Of The Contract. d. All External Internet Connections To Va Network Involving Va Information Must Be In Accordance With Va Trusted Internet Connection (tic) Reference Architecture And Va Directive And Handbook 6513, Secure External Connections And Reviewed And Approved By Va Prior To Implementation. Government-owned Contractor-operated Systems, Third Party Or Business Partner Networks Require A Memorandum Of Understanding (mou) And Interconnection Security Agreements (isa). e. Contractor Procedures Shall Be Subject To Periodic, Announced, Or Unannounced Assessments By Va Officials, The Oig Or A 3pao. The Physical Security Aspects Associated With Contractor Activities Are Also Subject To Such Assessments. The Contractor Shall Report, In Writing, Any Deficiencies Noted During The Above Assessment To The Va Cor/co. The Contractor Shall Use Va S Defined Processes To Document Planned Remedial Actions That Address Identified Deficiencies In Information Security Policies, Procedures, And Practices. The Contractor Shall Correct Security Deficiencies Within The Timeframes Specified In The Va Information Security Knowledge Service. f. All Major Information System Changes Which Occur In The Production Environment Shall Be Reviewed By The Va To Determine The Impact On Privacy And Security Of The System. Based On The Review Results, Updates To The Authority To Operate (ato) Documentation And Parameters May Be Required To Remain In Compliance With Va Handbook 6500 And Va Information Security Knowledge Service Requirements. g. The Contractor Shall Conduct An Annual Privacy And Security Self-assessment On All Information Systems And Outsourced Services As Required. Copies Of The Assessment Shall Be Provided To The Cor/co. The Va/government Reserves The Right To Conduct Assessment Using Government Personnel Or A Third-party If Deemed Necessary. The Contractor Shall Correct Or Mitigate Any Weaknesses Discovered During The Assessment. h. Va Prohibits The Installation And Use Of Personally Owned Or Contractor-owned Equipment Or Software On Va Information Systems. If Non-va Owned Equipment Must Be Used To Fulfill The Requirements Of A Contract, It Must Be Stated In The Service Agreement, Sow, Pws, Pd Or Contract. All Security Controls Required For Government Furnished Equipment Must Be Utilized In Va Approved Other Equipment (oe). Configuration Changes To The Contractor Oe, Must Be Funded By The Owner Of The Equipment. All Remote Systems Must Use A Va-approved Antivirus Software And A Personal (host-based Or Enclave Based) Firewall With A Va-approved Configuration. The Contractor Shall Ensure Software On Oe Is Kept Current With All Critical Updates And Patches. Owners Of Approved Oe Are Responsible For Providing And Maintaining The Anti-virus Software And The Firewall On The Non-va Owned Oe. Approved Contractor Oe Will Be Subject To Technical Inspection At Any Time. i. The Contractor Shall Notify The Cor/co Within One Hour Of Disclosure Or Successful Exploits Of Any Vulnerability Which Can Compromise The Confidentiality, Integrity, Or Availability Of The Information Systems. The System Or Effected Component(s) Need(s) To Be Isolated From The Network. A Forensic Analysis Needs To Be Conducted Jointly With Va. Such Issues Will Be Remediated As Quickly As Practicable, But In No Event Longer Than The Timeframe Specified By Va Information Security Knowledge Service. If Sensitive Personal Information Is Compromised Reference Va Handbook 6500.2 And Section 5, Security Incident Investigation. j. For Cases Wherein The Contractor Discovers Material Defects Or Vulnerabilities Impacting Products And Services They Provide To Va, The Contractor Shall Develop And Implement Policies And Procedures For Disclosure To Va, As Well As Remediation. The Contractor Shall, Within 30 Business Days Of Discovery, Document A Summary Of These Vulnerabilities Or Defects. The Documentation Will Include A Description Of The Potential Impact Of Each Vulnerability And Material Defect, Compensating Security Controls, Mitigations, Recommended Corrective Actions, Fbonotice Cause Analysis And/or Workarounds (i.e., Monitoring). Should There Exist Any Backdoors In The Products Or Services They Provide To Va (referring To Methods For Bypassing Computer Authentication), The Contractor Shall Provide the Va Co/co Written Assurance They Have Permanently Remediated These Backdoors. k. All Other Vulnerabilities, Including Those Discovered Through Routine Scans Or Other Assessments, Will Be Remediated Based On Risk, In Accordance With The Remediation Timelines Specified By The Va Information Security Knowledge Service And/or The Applicable Timeframe Mandated By Cybersecurity & Infrastructure Security Agency (cisa) Binding Operational Directive (bod) 22-01 And Bod 19-02 For Internet-accessible Systems. Exceptions To This Paragraph Will Only Be Granted With The Approval Of The Cor/co. 8. Security And Privacy Controls Compliance Testing, Assessment and Auditing. This Entire Section Applies Whenever Section 6 Or 7 Is Included. a. Should Va Request It, The Contractor Shall Provide A Copy Of Their (corporation S, Sole Proprietorship S, Partnership S, Limited Liability Company (llc), Or Other Business Structure Entity S) Policies, Procedures, Evidence And Independent Report Summaries Related To Specified Cybersecurity Frameworks (international Organization For Standardization (iso), Nist Cybersecurity Framework (csf), Etc.). Va Or Its Third-party/partner Designee (if Applicable) Are Further Entitled To Perform Their Own Audits And Security/penetration Tests Of The Contractor S It Or Systems And Controls, To Ascertain Whether The Contractor Is Complying With The Information Security, Network Or System Requirements Mandated In The Agreement Between Va And The Contractor. b. Any Audits Or Tests Of The Contractor Or Third-party Designees/partner Va Elects To Carry Out Will Commence Within 30 Business Days Of Va Notification. Such Audits, Tests And Assessments May Include The Following: (a): Security/penetration Tests Which Both Sides Agree Will Not Unduly Impact Contractor Operations; (b): Interviews With Pertinent Stakeholders And Practitioners; (c): Document Review; And (d): Technical Inspections Of Networks And Systems The Contractor Uses To Destroy, Maintain, Receive, Retain, Or Use Va Information. c. As Part Of These Audits, Tests And Assessments, The Contractor Shall Provide All Information Requested By Va. This Information Includes, But Is Not Limited To, The Following: Equipment Lists, Network Or Infrastructure Diagrams, Relevant Policy Documents, System Logs Or Details On Information Systems Accessing, Transporting, Or Processing Va Data. d. The Contractor And At Its Own Expense, Shall Comply With Any Recommendations Resulting From Va Audits, Inspections And Tests. Va Further Retains The Right To View Any Related Security Reports The Contractor Has Generated As Part Of Its Own Security Assessment. The Contractor Shall Also Notify Va Of The Existence Of Any Such Security Reports Or Other Related Assessments, Upon Completion And Validation. e. Va Appointed Auditors Or Other Government Agency Partners May Be Granted Access To Such Documentation On A Need-to-know Basis And Coordinated Through The Cor/co. The Contractor Shall Comply With Recommendations Which Result From These Regulatory Assessments On The Part Of Va Regulators And Associated Government Agency Partners. 9. Product Integrity, Authenticity, Provenance, Anti-counterfeit And Anti-tampering. This Entire Section Applies When The Acquisition Involves Any Product (application, Hardware, Or Software) Or When Section 6 Or 7 Is Included. a. The Contractor Shall Comply With Code Of Federal Regulations (cfr) Title 15 Part 7, Securing The Information And Communications Technology And Services (icts) Supply Chain , Which Prohibits Icts Transactions From Foreign Adversaries. Icts Transactions Are Defined As Any Acquisition, Importation, Transfer, Installation, Dealing In Or Use Of Any Information And Communications Technology Or Service, Including Ongoing Activities, Such As Managed Services, Data Transmission, Software Updates, Repairs Or The Platforming Or Data Hosting Of Applications For Consumer Download. b. When Contracting Terms Require The Contractor To Procure Equipment, The Contractor Shall Purchase Or Acquire The Equipment From An Original Equipment Manufacturer (oem) Or An Authorized Reseller Of The Oem. The Contractor Shall Attest That Equipment Procured From An Oem Or Authorized Reseller Or Distributor Are Authentic. If Procurement Is Unavailable From An Oem Or Authorized Reseller, The Contractor Shall Submit In Writing, Details Of The Circumstances Prohibiting This From Happening And Procure A Product Waiver From The Va Cor/co. c. All Contractors Shall Establish, Implement, And Provide Documentation For Risk Management Practices For Supply Chain Delivery Of Hardware, Software (to Include Patches) And Firmware Provided Under This Agreement. Documentation Will Include Chain Of Custody Practices, Inventory Management Program, Information Protection Practices, Integrity Management Program For Sub-supplier Provided Components, And Replacement Parts Requests. The Contractor Shall Make Spare Parts Available. All Contractor(s) Shall Specify How Digital Delivery For Procured Products, Including Patches, Will Be Validated And Monitored To Ensure Consistent Delivery. The Contractor Shall Apply Encryption Technology To Protect Procured Products Throughout The Delivery Process. d. If A Contractor Provides Software Or Patches To Va, The Contractor Shall Publish Or Provide A Hash Conforming To The Fips Security Requirements For Cryptographic Modules (fips 140-2 Or Successor). e. The Contractor Shall Provide A Software Bill Of Materials (sbom) For Procured (to Include Licensed Products) And Consist Of A List Of Components And Associated Metadata Which Make Up The Product. Sboms Must Be Generated In One Of The Data Formats Defined In The National Telecommunications And Information Administration (ntia) Report The Minimum Elements For A Software Bill Of Materials (sbom). f. Contractors Shall Use Or Arrange For The Use Of Trusted Channels To Ship Procured Products, Such As U.s. Registered Mail And/or Tamper-evident Packaging For Physical Deliveries. g. Throughout The Delivery Process, The Contractor Shall Demonstrate A Capability For Detecting Unauthorized Access (tampering). h. The Contractor Shall Demonstrate Chain-of-custody Documentation For Procured Products And Require Tamper-evident Packaging For The Delivery Of This Hardware. summary: this Is A Sources Sought Notice And Not A Request For Quotes. This Request Is Solely For The Purpose Of Conducting Market Research To Enhance Vha S Understanding Of The Market S Offered Products, Services, And Capabilities. The Government Will Not Pay Any Costs For Responses Submitted In Response To This Sources Sought. this Sources Sought Notice Provides An Opportunity For Respondents To Submit Their Notice Of Ability, And Their Available Products And Services In Response To The Requirement. Vendors Are Being Invited To Submit Information Relative To Their Potential Of Fulfilling This Requirement In The Form Of A Capability Response That Addresses The Specific Requirement Identified In This Sources Sought. this Sources Sought Is To Facilitate The Contracting Officer S Review Of The Market Base, For Acquisition Planning, Size Determination, And Procurement Strategy. response Commitment: i. Response: all Potential Sources Are Invited To Submit, In Writing, A Capability Statement With Sufficient Information To Substantiate Your Business Is Reasonably Capable Of Performing The Work. The Capability Statement Must Clearly Demonstrate A Business S Ability To Fulfill The Requirement. The Burden Of Proof Rests With The Contractor; Therefore, Written Responses Must Provide Clear And Unambiguous Evidence To Substantiate Capabilities Appropriate To Satisfy This Need. a. Capability Statement With General Understanding Of The Industry And Current Knowledge And Subcontract Networks That Would Be Used To Support The Requirement As Identified Herein. Subcontractors Will Need The Security Requirements Listed In This Sources Sought. Submittals Furnished Will Not Be Returned To The Sender. No Debriefs Will Be Conducted. Eligibility In Participating In A Future Acquisition Does Not Depend Upon A Response To This Notice. responses Shall Provide Administrative Information, And Shall Include The Following As A Minimum: Company Name, Sam Uei Number, Company Mailing Address, Phone Number, Fax Number, Name And Title Of Designated Point Of Contact And E-mail Of Designated Point Of Contact. company Business Size And Status (i.e., Large Business, Small Business, Service-disabled Veteran Owned Small Business, Women-owned Small Business, Etc.), The Number Of Years In Business. b. Proprietary Information Is Neither Requested Nor Desired. If Such Information Is Submitted, It Must Clearly Be Marked "proprietary" On Every Sheet Containing Such Information, And The Proprietary Information Must Be Segregated To The Maximum Extent Practicable From Other Portions Of The Response (e.g., Use An Attachment Or Exhibit). submit Responses Email Only To Karly.gabrysiak@va.gov ii. Timeline: a. This Request Will Close On 01/06/2025 At 8am Est. notes: 1. This Sources Sought Is For Planning Purposes Only, And Does Not Constitute A Commitment, Implied Or Otherwise, That A Procurement Action Will Follow. The Department Of Veterans Affairs Will Use The Information Submitted In Response To This Notice At Its Discretion And Will Not Provide Comments To Any Submission; However, The Department Of Veterans Affairs Reserves The Right To Contact Any Respondent To This Notice For The Sole Purpose Of Enhancing The Department Of Veteran Affairs Understanding Of The Notice Submission. 2. The Content Of Any Responses To This Notice May Be Reflected In Any Subsequent Solicitation, Except For Content Marked Or Designated As Business Confidential Or Proprietary Which Will Be Fully Protected From Release Outside The Government. the Department Of Veteran Affairs Contracting Office Point Of Contact: name: Karly Gabrysiak title: Contract Specialist e-mail Address: Karly.gabrysiak@va.gov
Closing Date6 Jan 2025
Tender AmountRefer Documents 

Community Talk Tender

Civil And Construction...+1Civil Works Others
Corrigendum : Closing Date Modified
Czech Republic
Details: This Public Contract Is Divided Into Two Sub-Parts: 1. Part: Brownfield – Former Hovorany Agricultural Site 2. Part: Brownfield – Former Hovorany Agricultural Site – Ii. Stage A Participant in the Procurement Procedure Can Submit a Bid for One or Both Subparts of the Public Contract. Each Part Will Be Evaluated Separately. Subject of Performance For: 1st Part: Brownfield - Former Agricultural Area of Hovorany: The subject of this Part of the Public Contract is Construction Work Consisting in the Demolition of Buildings within the Agricultural Area in the Municipality of Hovorany. Decommissioned Agricultural Buildings Consist Of Two Separate Buildings. The demolished space is defined by the existing building of the former cattle shed, which is spread over an irregular floor plan. The central part has dimensions of 72.98 X 11.28 m, is covered with a gable roof with a slope of 36° and a ridge height of 9.02 m above the ground floor. On the South-East and North-West Side Above the Gate Adjacent Wooden Sheds. Further extensions were then realized along the south-west side. The object is located in the former Agricultural Area "Areál Živočisné Výroby" on Plot 2394 A 2395 in the Cadastral Territory of Hovorana. Part of the Subject of Implementation is the Vegetation of Areas, which will be created after the removal of two unused existing agricultural buildings - this is the creation of a forest park, which will ensure the creation of a natural storage of carbon (co2). This Part of the Public Contract will be Co-financed from the European Union, Specifically from the Rrf Tool, through the National Recovery Plan, the State Investment Support Fund Program (hereinafter referred to as "sfpi"), Program: Brownfields Npo, Call No. 13/npobf/2024 A Subsidy Provision Agreement No. 267001081. Subject Fulfillment For: 2. Part: Brownfield – Former Agricultural Area Hovorany – Ii. Stage: The subject of this part of the public contract is construction work consisting in the demolition of the stables, piggery and fertilizer warehouse within the agricultural area in the village of Hovorany. The stable building being removed is a ground-floor building without a basement forming one separate building object. The space to be demolished is defined by the existing building of the former horse stable, which is spread over an irregular floor plan. The central part has a dimension of 36.58 X 18.40 m. The piggery structure being removed is a ground-floor building without a basement forming one separate building object. The Demolished Space Is Delimited By The Existing Building Of The Former Pig Farm, Which Is On A Rectangular Floor Plan Of 40.35 X 8.96 M. The Removed Fertilizer Warehouse Building Is A Ground Floor Building Without A Basement Forming One Separate Building. The demolished space is defined by the existing object of the former fertilizer warehouse, which is spread over a rectangular floor plan measuring 72.00 X 10.70 m. Part of the subject of the filling are the vegetation modifications of the areas that will be created after the removal of three unused existing agricultural buildings (the stables, piggery, warehouse Fertilizer) – This is Creation A forest park that will ensure the creation of a natural carbon storage (co2). For this part of the public order, a request is submitted for co-financing from the funds of the European Union, specifically from the Rrf instrument, through the National Recovery Plan, the Program of the State Fund for the Support of Investments (hereinafter referred to as "sfpi"), Program: Brownfieldy Npo, Call No. 14/npobf/2024. The Contracting Authority warrants that the Subject of this Public Order will be realized in full only in the event of a concluded Subsidy Agreement (assuming Evaluation 1/2025). In the event of not concluding a Subsidy Agreement with the Provider of Subsidy Funds, the Contracting Authority reserves the right not to implement the full scope of this Part 2 of the Public Contract and to unilaterally terminate the concluded Work Contract without notice in accordance with § 1998 of Act No. 89/2012 Coll., Civil Code. In Such Case, The Selected Contractor Is Not Entitled To Reimbursement For Unrealized Construction Work Nor Entitled To Compensation For Any Damage And Lost Profit.
Closing Date2 Jan 2025
Tender AmountCZK 23.9 Million (USD 991.3 K)

Nayara Energy Limited Tender

Works
India
Tender Id: RFQ/VAD/CIVIL/6100001115 | Rfq 6100001115 Csr Works For Village Infrastructure Upgradation With Focus On Development Of Roads, Lanes & Drainage At Surrounding Village Outside Refinery, 1year Arc
Closing Date8 Jan 2025
Tender AmountNA 

Council For Technical Education Vocational Training Ctevt Tender

Civil And Construction...+1Building Construction
Nepal
Tender Id: CTEVT/TPI.Exp081/82/Civil-01 | Construction Of Workshop Block Of Thaha Polytechnic Institute, Chitlang
Closing Date3 Jan 2025
Tender AmountRefer Documents 

Centre For Railway Information Systems - CRIS Tender

Works
Civil And Construction...+1Civil Works Others
Ireps
India
Tender Id: CRIS_CIVIL_2024_14-CRIS-HQ-CIVIL/CRIS | Replacing Of Corroded Cgi Sheet Of The Two Wheeler Parking Area Shed In Cris Office Complex, Chanakyapuri, New Delhi.
Closing Date9 Jan 2025
Tender AmountINR 326.8 K (USD 3.7 K)

Mumbai Railway Vikas Corporation Limited - MRVCL Tender

Works
Civil And Construction...+1Excavation
Ireps
India
Tender Id: MRVC_W_MUTP3A_KYN-BUD_259-MRVC-HQ-CIVIL/MRVCL | Construction Of Additional Bridges/viaduct And Other Miscellaneous Works In Connection With Proposed 3rd & 4th Line Between Kalyan-badlapur Stations Of Central Railway.
Closing Date7 Jan 2025
Tender AmountINR 343.1 Million (USD 3.9 Million)

Western Dedicated Freight Corridor - WDFC Tender

Works
Civil And Construction...+2Civil Works Others, Excavation
Ireps
India, India
Tender Id: MUM_N_EN_Balance_work_RUB-WDFC FIELD UNIT-VALSAD-CIVIL/WDFC | Construction Of Balance Works For Functioning Of Rubs Between Vaitarana - Bhilad Section In The
Closing Date6 Jan 2025
Tender AmountINR 257.2 Million (USD 2.9 Million)

New Mangalore Port Authority Tender

Civil And Construction...+1Road Construction
India
Tender Id: 2/409/CIVIL/Mtc-I/2022-TS | Warning Sign Board Display At National Highway
Closing Date4 Jan 2025
Tender AmountINR 16.1 K (USD 187)
3451-3460 of 3467 archived Tenders